Feeling Safe in the Home of the Future A product life-cycle approach to improve the trustworthiness of smart home products and services - BRIEFING ...

Page created by Joseph Blair
 
CONTINUE READING
Feeling Safe in the Home of the Future A product life-cycle approach to improve the trustworthiness of smart home products and services - BRIEFING ...
Feeling Safe in the
Home of the Future
A product life-cycle approach
to improve the trustworthiness
of smart home products
and services
BRIEFING PAPER
AUGUST 2020
Feeling Safe in the Home of the Future A product life-cycle approach to improve the trustworthiness of smart home products and services - BRIEFING ...
Cover: R Classen Layouts/Getty Images
     Inside: Hispanolistic/Getty Images, Marvin Samuel Tolentino Pineda/Getty Images,
     Eye Crave/Getty Images, Onfokus/Getty Images, Glenn Carstens-Peters/Unsplash

     Contents

3    Foreword

4    1 Introduction

7    2 Pre-Market

9    3 Sales and Setup

11   4 After-Market

13   5 Conclusion

14   Contributors

15   Endnotes

     © 2020 World Economic Forum. All rights
     reserved. No part of this publication may
     be reproduced or transmitted in any form
     or by any means, including photocopying
     and recording, or by any information
     storage and retrieval system.

                                                                                    Feeling Safe in the Home of the Future   2
Feeling Safe in the Home of the Future A product life-cycle approach to improve the trustworthiness of smart home products and services - BRIEFING ...
August 2020   Feeling Safe in the Home of the Future
              A product life-cycle approach to improve the trustworthiness of smart home products and services

              Foreword
              Smart home technologies are changing the
              way we live. It is time to change the way we
              design and manage these technologies.

                                                                                                             Jeff Merritt
                                            Burak Demirtas
                                                                                                             Head of Internet of
                                            Koç Holding Fellow,
                                                                                                             Things, Robotics and
                                            Centre for the Fourth
                                                                                                             Smart Cities, Member of
                                            Industrial Revolution,
                                                                                                             Executive Committee,
                                            World Economic Forum
                                                                                                             World Economic Forum

              For many children and young adults growing up                    first introduced in 2014 – the ease and speed in
              around the world today, voice assistants such as                 which consumers have adopted these and other
              Alexa, Siri or Google Assistant have become almost               smart home technologies has been dramatic.
              like another member of the family. They provide                  Meanwhile, many details about these technologies
              advice on the weather when you cannot decide                     – from their business models to their product
              what to wear, they answer your questions when you                features and maintenance plans – remain ill-defined
              are having trouble remembering a fact or are just                or shrouded in mystery. It is time for the smart
              feeling curious, they can tell you a joke or play your           home ecosystem to grow up.
              favourite songs if you are feeling down, and they
              may even help turn off the lights for you when it is             This paper is intended to spur collective thinking
              time for bed.                                                    and action among business, government and civil
                                                                               society. We invite you to join us as we work to
              Whereas voice assistants and smart speakers are                  shape the development, use and impact of these
              still relatively new – Amazon Alexa and Echo were                technologies for the benefit of society.

                                                                                              Feeling Safe in the Home of the Future   3
Feeling Safe in the Home of the Future A product life-cycle approach to improve the trustworthiness of smart home products and services - BRIEFING ...
1        Introduction
                      To realize the true promise of the smart
                      home, trust must be baked into each
                      phase of the product life cycle.

                      A home is more than a building or a place of shelter.    in our daily lives, businesses and society. Most
                      It is where we take care of the people and things that   notably, COVID-19 has dramatically increased
                      mean the most to us. Turning a physical structure        the amount of time people are spending at home.
                      into a place of comfort, safety and sanctuary is hard    According to data from Google’s COVID-19
                      work, but what if the home itself could help?            Community Mobility Report, the global average
                                                                               of time spent at home increased 35% in March
                      This is the promise of the smart home, a house           2020 as a wide range of shelter-at-home orders
                      equipped with internet-connected devices for             were put in place.3 In this context, research
                      controlling, automating and optimizing functions         from ABI Research suggests that smart home
                      such as temperature, lighting, security or               devices, such as touchless doors, cameras and
                      entertainment, either remotely or through a system       smart speakers, have an important role to play
                      within the house. Incorporating these Internet           in enabling safe social distancing. The need for
                      of Things (IoT) devices into a home can help a           contactless ordering and delivery of goods, for
                      homeowner increase the safety of their loved ones        example, is expected to increase global sales of
                      and valuables, save money on energy bills, improve       voice-controlled devices and cameras.4
                      their wellness and save time.
                                                                               Smart home IoT devices can also take care of the
                      Technological advancements can also come with            world outside of the home. By enabling a more
                      unintended impacts for society. The appliance            efficient use of energy, devices such as smart
                      boom brought forward by the Second Industrial            thermostats, smart lights and smart refrigerators
                      Revolution, for example, not only made it easier to      hold the potential to decrease a home’s impact
                      do laundry, it ultimately opened the door for more       on the environment. If half of homes globally
                      women to enter the workforce.1 The introduction          transitioned to using smart thermostats by 2050,
                      and expansion of processed foods and microwave           it is estimated that 2.6 gigatons of carbon dioxide
                      ovens made mealtime easier at home, but also             emissions would be eliminated, roughly equal to
                      contributed to higher rates of obesity.2 As the smart    8% of global CO2 emission in 2019.5
                      home environment continues to evolve, the full
                      range of new opportunities – as well as potential        The concept of a smart home is not a recent
                      challenges – continue to emerge.                         creation; it has featured in laboratories and popular
                                                                               culture since the early 1900s. Yet, with recent
                      The COVID-19 pandemic is shining a spotlight             advances in wireless technology and mobile
                      on the potential impact of smart home devices            platforms, smart home devices have become

      FIGURE 1        Smart home devices by segment

   Smart appliances                      Security                     Home entertainment                 Comfort and lighting

Control and connectivity                                                                                 Energy management

                                                                                            Feeling Safe in the Home of the Future     4
Feeling Safe in the Home of the Future A product life-cycle approach to improve the trustworthiness of smart home products and services - BRIEFING ...
affordable, viable and in demand. Smart home              Data Corporation (IDC) Worldwide Quarterly Smart
devices typically fall into one of six verticals:         Home Device Tracker, the smart home market is
energy management, comfort and lighting, home             forecast to grow at a compound annual growth
entertainment, security, smart appliances, control        rate of 17% from 2019-2023 with nearly 1.6 billion
and connectivity.6 According to the International         devices shipped in 2023.

A crisis of trust

To harness these benefits for consumers and               –   28% of respondents do not want to buy a smart
the planet and drive economic value, smart                    device due to cybersecurity concerns
home devices must have trust built in so that
consumers feel they are fair and safe to use.             –   88% of respondents think that manufacturers
Incorporating trust across the life cycle of a                should have to comply with legal privacy and
device is essential for a thriving smart home                 security standards
ecosystem. Whereas individual consumers may
place different value on the product features             These findings clearly articulate the connection
that they feel are important when purchasing              between consumer trust and the privacy and
devices, consumers come with preexisting                  security of IoT devices. Moreover, they show that
expectations regarding the privacy, security,             consumers expect policy-makers to play an active
reliability, usability and resilience of their devices.   role in creating a trustworthy environment by
Each one of these aspects effect consumers’               enacting regulations and guidelines for privacy and
perception on the trustworthiness on the product          security. As such, this paper will mainly focus on
and the manufacturer.                                     the privacy and security aspects of the smart home
                                                          ecosystem to improve trust.
There are a number of important questions on
consumers’ minds as they consider purchasing              Contrary to common public perception, smart home
smart home devices:                                       device manufacturers have been heavily investing
                                                          in new innovations to build more trustworthy
–   Could someone hack into my security camera            devices. This includes technical solutions like
    without my knowledge?                                 encrypting communication between devices and
                                                          storing personal data in secured cloud platforms.
–   Do companies sell my information to other             Many of consumer concerns stem from the fact
    companies for extra revenue?                          that neither these technical implementations nor
                                                          the data sharing protocols between companies are
–   Is my voice assistance listening to my                transparent or easy to understand.
    conversations? Can I delete my data?
                                                          Additionally, sources such as the Internet Society’s
–   Could law enforcement get access to my data?          report The economics of the security of consumer-
                                                          grade IoT products and services,8 identify
Recent research conducted by Consumers                    misaligned incentives on cost of security risks and
International and the Internet Society found:7            missing responsibility on attacks to external entities
                                                          by these IoT devices as critical factors for lack
–   75% of respondents distrust the way data              of trust. Taken together, the transparency issues
    is shared                                             related to technical complexities and the economic
                                                          considerations related to cost of risks demonstrate
–   50% of respondents do not know how to                 an obvious gap between stakeholders’ perceptions
    disable a data collection feature                     of trustworthiness in smart home devices.

A path forward

Effectively building consumer trust will                  protections that reflect common duty of care and
require collective action by all stakeholders in          establishing the respective responsibilities of the
the smart home ecosystem. This includes, but              business community and consumers or end users
is not limited to, device manufacturers, standard         of technology.
development organizations, retailers, government
and civil society organizations. Among these              While regulations and standards are critical
stakeholders, policy-makers have an important             in creating a trustworthy smart home environment,
role to play in establishing a level of consumer          crafting them is no easy feat. Things like software

                                                                       Feeling Safe in the Home of the Future   5
Feeling Safe in the Home of the Future A product life-cycle approach to improve the trustworthiness of smart home products and services - BRIEFING ...
updates, data collection and internet connectivity      called the pre-market phase and it encompasses
           require frameworks to consider not only                 activities handled prior to launch: design, business
           design phase implementations and processes,             development and manufacturing. The second
           but also after sales implementations and                phase is called sales and setup, and it includes
           processes too.9 To develop proper policies that         activities related to product marketing, educating
           take these features into account, it is important       consumers about product capabilities and
           to consider all the processes related to product        providing consent mechanisms during product
           life cycle; from design to business model, to           setup. The final phase, called after-market,
           manufacturing, marketing and even aftersales of         focuses on software feature updates and user
           a smart home device.                                    rights on data-related processes. Although there
                                                                   are some common themes in all these phases,
           These elements of the product life cycle can be         each offers unique opportunities for building
           grouped into three phases. The first phase is           consumer trust.

FIGURE 2   Product life-cycle phases and trust-related topics

                    Pre-market                      Sales and setup                        After-market

           –   Business models and            –   Transparency of IoT             –   Software update and dynamic
               privacy aspects                    products capabilities               product management
           –   Security by design             –   Consent mechanisms              –   User rights on data
                                                                                      management

           The sections that follow are structured to map          the section on the after-market phase is dedicated
           against the three phases of the smart home product      to software updates and user rights on data
           life cycle. Section one on the pre-market phase         management of devices. Through each of these
           focuses on the impact of business models on             sections, this paper intends to help policy-makers
           privacy and security by design principles. Section      and other key stakeholders understand, consider
           two addresses the sales and setup phase and             and incorporate the phases of the smart home
           elaborates on topics related to product feature         product life cycle as they define collective actions
           transparency and consent mechanisms. Finally,           and guidelines for privacy and security.

                                                                                Feeling Safe in the Home of the Future    6
Feeling Safe in the Home of the Future A product life-cycle approach to improve the trustworthiness of smart home products and services - BRIEFING ...
2   Pre-Market
    Trustworthy products begin with good
    product design.

    A smart home product or service is more than            Oftentimes, there is an additional component
    a physical device. In fact, there are three core        layered on top to allow for data sharing or device
    components that are generally required for a smart      interoperability. It is not uncommon for each of
    home product to achieve “smart” functionality:          these components within a single smart home
                                                            product to be developed or managed by a different
    –   A human-computer interface                          party. This layered structure and complex business
                                                            model creates an untamed information jungle
    –   A data platform over cloud infrastructures          with regard to technology stacks, business models
                                                            and privacy, which creates distrust on the part of
    –   An internet-enabled device                          the consumer.

    Business models and their effect on privacy

    One of the ways in which smart home products            protect user data properly. Unfortunately,
    have enabled companies to improve their                 there are plenty of examples of irresponsible
    revenues is by selling software services with smart     stewardship of personal data collected by smart
    home products. Arlo, a smart camera product             home devices. Recently, the Electronic Frontier
    manufacturer, for example, released home security       Foundation (EFF) conducted a test with Ring
    solutions by selling cameras as products and cloud-     doorbell devices and discovered that the devices
    recording capabilities with a monthly subscription.10   were sharing data with third-party companies,
    Moreover, smart home products enable new                such as Facebook APIs.13 Since data-sharing
    business models such as advertising, subscriptions,     features are embedded into the software of the
    pay-per-use and maintenance contracts by                device, a user is not provided with the chance to
    leveraging connectivity and continuous data             learn what information is shared.
    streams. For example, streaming service boxes like
    Roku and Amazon Fire TV work as platforms for           In recent years, regulators have spent a great
    television channels, but they also create contracts     amount of time deploying new privacy regulations
    based on user subscription and advertisement            such as the General Data Protection Regulation
    revenue. In fact, the majority of revenue for these     (GDPR) and California Consumer Privacy Act
    streaming box companies does not come from              (CCPA). However, it is still difficult for consumers
    selling streaming devices, but rather through ads       to check if their devices, or the manufacturers
    and subscriptions.11                                    of their devices, are compliant with these
                                                            regulations. Transparency is essential to overcome
    Unbeknownst to consumers, these companies               this challenge, and there are models for how
    may also be generating revenue based on                 transparency helped consumers in other areas
    consumer data. According to research conducted          like OSHWA’s Open Source Hardware Certificate,
    by Princeton University and the University of           Creative Commons’ content licensing, the FCC’s
    Chicago, 89% of Amazon Fire TV channels and             Broadband Nutrition Labels, Carnegie Mellon
    69% of Roku channels include tracking software          University’s Privacy Nutrition Labels, the iFixit
    that collects information about viewing habits and      Reparability Score, CE certification, the German
    preferences of the users.12                             Blue Angel environmental label, Fairtrade, energy
                                                            star for home appliances and laundry labels.14
    While the research on streaming devices show
    the hidden data collection mechanisms, Consumers        As listed above, there are many efforts either
    International’s research reveals that 65% of            within the field or in different domains to enable
    consumers are concerned about data collection           transparency. It is crucial to merge the knowledge
    and data sharing through their smart home devices.      in these efforts with the needs of privacy in IoT and
                                                            consumer education in technology. So, consumers
    Clearly, one important factor in building trust is      become more informed within time to evaluate the
    ensuring that device manufacturers store and            products and services.

                                                                         Feeling Safe in the Home of the Future     7
Feeling Safe in the Home of the Future A product life-cycle approach to improve the trustworthiness of smart home products and services - BRIEFING ...
Security by design

                                      With every new connected device, the                                      Finally, security by design should encompass the
                                      cybersecurity risk increases exponentially.                               manufacturing processes of smart home products. In
                                      Especially botnets, such as Kaiten, Qbot and                              today’s connected world, this means that the supply
                                      Mirai, use IoT devices as the host for an attack to                       chain should be considered as critical as in-house
                                      critical internet infrastructure.15 Consider the Mirai                    design. For example, many of the smart home device
                                      botnet attack that caused many internet services                          manufacturers use microcontrollers that are designed
                                      to collapse in 2016. This attack originated in                            and manufactured by third parties. Since consumers
                                      and spread through internet routers and security                          do not have insight into these relationships, it is the
                                      cameras that were using default passwords. This                           device manufacturer’s responsibility to check all
                                      shows that designing the functionality of password                        supply chain steps properly.
                                      management is necessary, but not enough for
                                      achieving security.                                                       It is not feasible to expect a user to understand
                                                                                                                and manage all of these risks properly. On the
                                      Another important feature that increases                                  one hand, a regulatory framework is needed to
                                      security and empowers consumers is two-factor                             standardize device security schemes for smart home
                                      authentication (2FA).16 By implementing 2FA,                              devices. On the other hand, due to differences
                                      companies enforce consumers to be a participant                           in IoT products’ capabilities, a one-size-fits-all
                                      in the authentication process. As a result, this                          approach may not work while developing policies.
                                      reduces the risk of hacking of the devices. Admin
                                      password change and 2FA are just two of the                               While new regulations such as the EU
                                      several concepts that manufacturers can embed                             cybersecurity Act, California Bill SB-327 and
                                      to the smart home products to improve security by                         Oregon House Bill 2395 are being released, there
                                      enabling consumer contribution.                                           are also many industrial initiatives attempting to
                                                                                                                standardize products. The Common Criteria (ISO
                                      Another critical factor to consider when it comes                         15408) framework,18 Underwriters Laboratories’
                                      to designing for security is the relationship to other                    IoT Rating scheme19 and Mozilla Foundation’s
                                      devices. If there are several connected devices                           Privacy Not Included Guide,20 IoTSF Compliance
                                      within the same network, the device with the                              Framework21 and Online Trust Alliance’s The OTA
                                      weakest security precautions may cause other                              IoT Trust Framework22 are some of the efforts that
                                      devices to be hacked. In 2017, hackers took over                          organizations are actively working on. But, none
                                      a casino’s customer database through a fish tank’s                        of them currently forces manufacturers to comply
                                      temperature adjustment system within the casino.17                        with them. As a result, products that do not have
                                      While it is not expected for a temperature sensor to                      proper security precautions can compromise an
                                      have as high-level security as a camera, it should                        entire smart home environment. Comprehensive
                                      support a meaningful level of security by its design                      standardization of security will improve the reliability
                                      to reduce the risk to other devices.                                      of the overall smart home ecosystem.

              FIGURE 3                Underwriters Laboratories’ IoT Rating scheme

          Bronze                               Silver                               Gold                                 Platinum                             Diamond
          Essential                            Enhanced                             Advanced                             Extensive                            Comprehensive

No default passwords                  Access control                       Stored and transmitted              Known threat testing                  Malicious software
Users do not have to rely on          Access to features which             data security                       The device and its software           modification detection
default passwords programmed          hold sensitive information i.e.      When data is stored or              have been tested for publicly         The device is able to detect if
into a product. Users are instead     security settings and personal       transmitted to the device, the      known threats.                        foreign code is being inserted
urged to choose passwords             information are protected            data is secured by using industry                                         into its system and prevent that
which are difficult to guess/crack.   by additional authentication         supported encryption.               Malware protection                    code from altering the device.
                                      mechanisms.                                                              The device does not
Secure update mechanism                                                    Secure out-of-the-box               automatically accept                  Illegitimate accesss
Regardless of the method of           Industry privacy best practice       settings                            and respond to                        attempt protection
software update – on-demand           The type of data that is collected   The device is secure and ready      untrusted code.                       The device protects against
or automatic – the updated files      processed and stored by              for use without unnecessary                                               repeated fail log-in attempts.
are validated and confirmed to        the device is made known to the      intervention by the user.           Permanent log-in prevention
be secure and necessary               user, and the user is given                                              A user is not able to remain          User data annonymization
protected by additional               the opportunity to consent           Mobile App security                 logged in for an indefinite           Data which is processed,
authentication mechanisms.            to such collection, processing       maintenance                         amount of time. The system            collected and stored is kept in
                                      or storage.                          If a device connects to             will intermittently re-authenticate   a format which will not lead to
Secure reset                                                               an app, the app itself is           the user.                             identification of the user.
The factory reset button or           Product security maintenance         monitored and maintained
function securely removes all         The device is monitored and          for security concerns.
sensitive data.                       maintained for security concerns
                                      after sale of the device.
Secure connections
Any communication connections
being utilized by the device
are validated and confirmed
to be secure.

                                                                                                                                  Feeling Safe in the Home of the Future                8
3   Sales and Setup
    Transparency is a critical first step to enable
    more informed and empowered consumers.

    Smart home products have become so ubiquitous           consumers look for information available about the
    that consumers can do many daily tasks such as          product’s privacy and security either on a website
    turning on and off devices and monitoring home          or in literature included with the product during their
    security with the help of these devices easily. Voice   purchasing decision process. Moreover, only 50%
    assistants, smart thermostats, security cameras         of consumers know how to disable data collection
    and others make daily life and home management          features on these devices. This knowledge gap
    easier and more efficient, but consumers have little    for privacy and security requires policy-makers to
    knowledge about how the manufacturers of these          address transparency issues at two key moments
    devices collect and share personal data. Research       in time: in the creation of marketing materials and
    from Consumers International shows that 77% of          at the initial at-home setup of products.

    Transparency of IoT product features

    Providing real-time situational awareness that          technical differences that are not immediately clear
    enables adaptability and efficiency is one of many      to consumers. Even with technical explanations in
    important features of smart home devices. This          online retail pages or product packages, it is hard to
    situational awareness is powered by the continuous      understand the implications of these specifications.
    collection of data from the surrounding environment.    To reduce this knowledge gap, critical features of
    While the purpose for providing situational             the devices – such as purpose, wireless technology
    awareness is the same for every device, the technical   and data storage location – must be more accessible
    capabilities and execution may be different. Consider   for consumers.
    smart doorbell products; at their core, they are
    intended to let a homeowner know the person at the      Several groups are working on labeling
    door by sharing the scene that it records. However,     frameworks to tackle this problem for the smart
    there are a variety of products on the market that      home,23 medical wearables24 and public spaces,25
    offer different video-sharing features. For example,    but a formal policy has not been developed yet.
    Eufy offers cameras with local storage, while Ring      Consequently, consumers try to learn not only the
    sells products with cloud storage service. Even         features of the product, but also how it operates
    though both doorbells let users see who is at the       too. If there can be a guideline created like Figure 4
    door, their data collection and sharing technology      below, then people will be able to match their need
    are different. Many smart home devices have these       with the products more efficiently.

                                                                         Feeling Safe in the Home of the Future   9
FIGURE 4   An example IoT device label developed at Carnegie Mellon University

           Consent mechanisms at initial setup

           After purchasing a smart home product, a              text.26 The 25% that try to read the text only spend
           consumer must sign up to an IoT platform, usually     on average one minute checking the text, which
           through a smartphone application, in order to use     has several thousand words.
           the product. Oftentimes, this sign up requires a
           consumer to share personal information such as        By updating the terms of service process and the
           an email or telephone number and accept a terms       text within these documents, the IoT ecosystem
           of service document. Terms of service documents       can increase the awareness of consumers, create
           are the main contract between a consumer and a        consumer agency and improve trust. For example,
           manufacturer. They are also considered to reflect a   one initiative called “Terms of Service; Didn’t
           consumer’s consent to the services that the smart     Read” examines the text of ToS and grades them
           home product offers.                                  according to their attitude about data collection,
                                                                 sharing and managing user privacy.27 Besides the
           Typically, terms of service documents are long        declaration, the initiative also shares the insights
           and laden with legalese. This tends to lead           openly online. While it is tricky to balance user
           consumers to skip over the terms and accept           consent and legal responsibilities of manufacturers,
           them blindly. Research from York University and       it is important for policy-makers to consider
           Michigan State University shows that 75% of users     a clearer terms of service process to improve
           “ACCEPTS” terms of service without reading the        consumers’ trust.

                                                                              Feeling Safe in the Home of the Future   10
4   After-Market
    Software updates can enable new and
    improved services; they can also erode
    trust if not properly managed.

    Because smart home products are internet                 As Tesla created new business value out of software
    connected, they require software updates and data        updates, smart home product manufacturers also
    collection features that conventional products do        could begin offering new services that consumers
    not need. Autonomous vehicles provide analogous          pay extra money too. While the potential for
    insights into the way connected products can             innovation is massive, update and data management
    incorporate software and hardware updates to             infrastructures require regulation and standardization
    maintain and enhance the value of a connected            in order to maintain the trustworthiness of these
    product. This is perhaps best evidenced in the           products. Because manufacturers sell their products
    way Tesla releases software updates to improve           not only with features existing today, but the
    the autopilot capabilities of its cars. Within these     promises they give for the features that are going to
    software updates, Tesla includes features like active    be available in the future with the help of software
    safety and advanced driver assistance. Through           update and data management infrastructure.
    these features and the associated data collection        Regulation and standardization mechanisms
    mechanisms, insurance companies are able to              will ensure these platforms to operate with high
    offer new insurance services based on safe               availability and securely to deliver their promises to
    driving patterns.28                                      all their customers.

    Software updates and dynamic
    product management

    One of the most exciting capabilities of smart           smart TVs.31 Since cyberthreats are evolving day
    home products is the way they enable new                 by day, IoT device manufacturers should have
    feature introduction through software updates. For       infrastructure and processes in place to protect
    example, a young couple might purchase a washing         and update devices against cyberattacks.
    machine, and then have the ability to upgrade it
    and include a “baby clothing” programme upon             While the introduction of software updates enables
    having their first child.29 But, if the feature update   new and improved services, it also has the
    and maintenance processes are not designed               potential to decrease consumer awareness, bypass
    properly, customers will become upset and                meaningful consent and ultimately erode trust.
    companies will lose credibility. Consider Sonos’s        Currently, there is no regulation holding smart home
    recent announcement that it would stop releasing         manufacturers accountable to a standard. This
    software updates for some of its products.30 This        has implications for operational continuity, raising
    created a customer backlash and degraded the             questions. How will the warranty of this IoT product
    value of Sonos products as people feared that their      be affected if the user does not download the
    product might soon become obsolete. Eventually,          software update? How can the user be sure that
    the company’s CEO was forced to walk back his            this device is updated for newly detected viruses?
    decision and pledge to continue to provide software      It is important for policy-makers to fill this gap by
    updates for security purposes.                           enacting proper guidelines to enforce industry
                                                             for applying or developing proper standards for
    This example highlights another value driver of          software update infrastructure.
    software update for connected products: device
    cybersecurity. In 2016, the Mirai botnet attacked        The information technology industry has been
    such connected devices as IP cameras and home            working on these issues for some time and has
    routers, allowing it to enter and crash internet         developed and implemented a group of standards
    services around the world. A recent threat analysis      like ISO 2700132 (Information Security Management
    conducted by Palo Alto Networks’ Unit 42 revealed        System) and 2230133 (Business Continuity
    that a new version of the Mirai botnet is targeting      Management). According to these standards,

                                                                          Feeling Safe in the Home of the Future   11
companies must meet several requirements              for continuous operation and cyberthreat
related to continuous operation of their IT systems   management, policy-makers in the smart home
throughout their operational period. By modelling     domain can begin to build toward a more
this approach and defining standards                  trustworthy smart home environment.

User rights on data management

Like the Tesla insurance example, companies           dynamically by voice commands whenever they
are spinning up new business models based             want.34 Although this implementation is a helpful
on device usage data. This is usually driven by       improvement within the domain, there are many
data processing within the company or by sharing      devices that do not allow users to delete their data
data with third parties. In both cases, consumers     immediately even if requested.
can only participate in the process during the
consent approval stage. As discussed, consent         Regulations such as the EU’s General Data
mechanisms enable a legal framework for               Protection Regulation (GDPR) and the California
businesses to operate, but they do not engender       Consumer Privacy Act (CCPA) mandate
consumer trust. It is critical to enable some         manufacturers to delete all data related to
level of consumer agency over usage of data to        consumers whenever they request, but it is
enhance trust. For example, voice assistants have     not easy for consumers to find an interface to
been listening to us for some time and it was not     request deletion. To empower consumers to
an easy task for a regular consumer to delete         manage their data, there should be standards
personal data from the platforms. In 2019, Amazon     or regulations to check the effectiveness of the
released a new software for Echo devices, and         consumer data rights portals of consumer IoT
enabled consumers to delete their voice recordings    device manufacturers.

                                                                   Feeling Safe in the Home of the Future   12
5   Conclusion
    Regulations and governance models do not
    need to be reinvented; the building blocks for
    a more trustworthy smart home exist today.

    Trust is essential to realize the full potential of smart   have rights to manage their personal data. Thus,
    home technologies. Despite efforts by product               device manufacturers should be able to answer
    manufacturers to build more trustworthy and secure          users’ requests like deletion or correction of data
    platforms, consumer concerns persist with three-            immediately via a simple and easy to use interface.
    quarters of consumers expressing distrust over how          All these measures seem very complex, but they are
    their data is being shared and 28% of consumers             all important building blocks for a trustworthy smart
    saying they will not purchase smart devices due             home environment.
    to security risks. To overcome these concerns,
    increased transparency and consumer awareness               Regulations and governance related to each
    – particularly with regards to complex business             phase do not need to be reinvented or managed
    models and technical solutions – is essential. New          in separate frameworks. Rather, there are
    regulations, standards and governance models will           important efforts that has been in progress for
    need to build in trust at every stage of the product        some time like the European Telecommunications
    life cycle including during the design and pre-market       Standards Institute’s ETSI 303 645,35 Code of
    phase, during sales and setup, and after-market.            Practice for Consumer IoT Security36 in the United
                                                                Kingdom and National Institute of Standards
    In pre-market phases, privacy by design and security        and Technology’s NISTIR 825937 in the United
    by design principles should be controlled by either         States. Second, different industries like payment
    certification schemes or labeling mechanisms.               or IT systems have deployed policies according
    Moreover, the effect of business models on privacy          to their needs too. Finally, there are also relevant
    needs to be considered in detail. Second, product           academic studies like Carnegie Mellon University’s
    marketing materials and product packages should             labeling effort and Dartmouth College’s project on
    contain information about the device’s capabilities         security and privacy of IoT products.38 All these
    in a simpler way so that consumers can understand           efforts can be utilized as a baseline for a more
    better. Since users need to accept a terms of service       robust and reliable smart home ecosystem for
    agreement before using smart home devices,                  consumers to stay at home safely.
    consumers should be well-informed about what
    they are accepting during this process. Finally,            Now is the time for business, government and civil
    maintenance of smart home products requires some            society to come together, to align their efforts and
    extra effort to keep the device up to date and keep         ensure that everyone can feel safe in the home of
    secure against cyberattacks. In addition, consumers         the future.

                                                                             Feeling Safe in the Home of the Future   13
Contributors
Lead author

Burak Demirtas
Koç Holding Fellow, Centre for the Fourth Industrial
Revolution, World Economic Forum

Acknowledgments

This white paper benefitted from the input of experts and diverse stakeholders, including, but not limited to,
the following.

Rashid Alahmedi                                          Katerina Megas
Chief Operating Officer, Dubai Electricity and Water     Commercial Adoption Lead, Trusted Identities
Authority, United Arab Emirates                          Group and Program Manager, Cybersecurity for
                                                         Internet of Things (IoT) Program, National Institute
Kimmy Bettinger                                          of Standards and Technology (NIST), USA
Specialist, Internet of Things, Robotics and Smart
Cities, World Economic Forum                             Jeff Merritt
                                                         Head of Internet of Things, Robotics and Smart
Tim Danks                                                Cities, World Economic Forum
Vice-President, Risk Management & Partner
Relations, Huawei Technologies, USA                      Robert Morcos
                                                         Founder and Chief Executive Officer, Social
William Dixon                                            Mobile, USA
Head of Future Networks and Technology, Centre
for Cybersecurity, World Economic Forum                  Hitomi Sano
                                                         Associate Director, Corporate Strategy, Eisai, Japan
David Kotz
Pat and John Rosenwald Professor, Department             Geoff Wylde
of Computer Science, Dartmouth College, USA              Lead, Internet of Things, Robotics and Smart Cities,
                                                         World Economic Forum
Helena Leurent
Director-General, Consumers International,
United Kingdom

                                                                      Feeling Safe in the Home of the Future    14
Endnotes
1    Michele W. Berger, “How the appliance boom moved more women into the workforce”, PennToday, 30 January 2019,
     https://penntoday.upenn.edu/news/how-appliance-boom-moved-more-women-workforce.
2    Ultra-Processed Diets Cause Excess Calorie Intake and Weight Gain: An Inpatient Randomized Controlled Trial of Ad
     Libitum Food Intake. Hall KD, Ayuketah A, Brychta R, Cai H, Cassimatis T, Chen KY, Chung ST, Costa E, Courville A,
     Darcey V, Fletcher LA, Forde CG, Gharib AM, Guo J, Howard R, Joseph PV, McGehee S, Ouwerkerk R, Raisinger K,
     Rozga I, Stagliano M, Walter M, Walter PJ, Yang S, Zhou M. Cell Metabolism. 2019 May 10. pii: S1550-4131(19)30248-7.
     doi: 10.1016/j.cmet.2019.05.008. PMID: 31105044. https://www.ncbi.nlm.nih.gov/pubmed/31105044.
3    Mohammed Haddad, “Coronavirus: How much more time are people spending at home?”, Aljazeera, 12 April 2020,
     https://www.aljazeera.com/news/2020/04/coronavirus-world-staying-home-200406122943899.html.
4    Philip Prado, “Smart home tech sales could jump 30% as consumers combat the coronavirus”, androidauthority.com,
     1 April 2020, https://www.androidauthority.com/coronavirus-smart-home-1101558.
5    Paul Hawken, “Drawdown: The Most Comprehensive Plan Ever Proposed to Reverse Global Warming, 2017,
     https://www.amazon.com/dp/B01KGZVNT0/ref=dp-kindle-redirect?_encoding=UTF8&btkr=1.
6    Christoph Blumtritt, “Statista Digital Market Outlook, Smart Home Report 2019”, Statista.com, 1 September 2019,
     https://www.statista.com/study/42112/smart-home-report.
7    Consumers International, Internet Society, “The Trust Opportunity : Exploring Consumers’ Attitudes To the Internet
     of Things”, 1 May 2019, Consumers International & Internet Society, https://www.consumersinternational.org/
     media/261950/thetrustopportunity-jointresearch.pdf.
8    Mark McFadden, Sam Wood, Robindhra Mangtani, Grant Forsyth, “The Economics of the security of consumer-grade
     IoT products and services”, 1 April 2019, Internet Society, https://www.internetsociety.org/wp-content/uploads/2019/04/
     The_Economics_of_Consumer_IoT_Security.pdf.
9    Kevin Guerin, “A life cycle approach to IoT security”, https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-
     security/, 17 September 2019.
10   Vigderman, Aliza, “Arlo Camera System”, security.org, 6 July 2020, https://www.security.org/security-cameras/arlo.
11   Binder, Matt, “Netflix is paying to advertise on your Roku remote and you don’t even know it”, Mashable, 12 December
     2019, https://mashable.com/article/roku-button-home-screen-advertising.
12   Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Yuxing Huang, Nick Feamster,
     Edward W. Felten, Prateek Mittal, Arvind Narayanan, November 2019, Princeton.edu, https://www.princeton.
     edu/~pmittal/publications/tv-tracking-ccs19.pdf.
13   Bill Budington, “Ring Doorbell App Packed With Third-Party Trackers”, 27 January 2020, Electronic Frontier Foundation,
     https://www.eff.org/deeplinks/2020/01/ring-doorbell-app-packed-third-party-trackers.
14   Peter Bihr, “A trustmark for IoT”, Thingscon, 13 September 2017, https://thingscon.org/publications/report-a-trustmark-
     for-iot.
15   Trend Micro, “Caught in the Crossfire: Defending Devices From Battling Botnets”, 15 July 2020, https://www.trendmicro.
     com/vinfo/ph/security/news/internet-of-things/caught-in-the-crossfire-defending-devices-from-battling-botnets.
16   Fruhlinger, Josh, “2fa explained: How to enable it and how it works”, 10 September 2019, CSOOnline, https://www.
     csoonline.com/article/3239144/2fa-explained-how-to-enable-it-and-how-it-works.html.
17   Alex Schiffer, “How a fish tank helped hack a casino”, 21 July 2017, Washington Post, https://www.washingtonpost.com/
     news/innovations/wp/2017/07/21/how-a-fish-tank-helped-hack-a-casino.
18   Common Criteria Organisation, https://www.commoncriteriaportal.org.
19   Underwriters Laboratories, https://ims.ul.com/IoT-security-rating.
20   Mozilla Foundation, https://foundation.mozilla.org/en/privacynotincluded/about.
21   IoT Security Foundation, https://www.iotsecurityfoundation.org/iotsf-issues-update-to-popular-iot-security-compliance-
     framework.
22   Internet Society, https://www.internetsociety.org/resources/doc/2018/iot-trust-by-design, 22 May 2018.
23   Lily Hay Newman, “IoT Security Is a Mass. Privacy ‘Nutrition’ Labels Could Help”, 9 June 2020, Wired, https://www.
     wired.com/story/iot-security-privacy-labels.
24   Andrea Coravos, Megan Doerr, Jennifer Goldsack, Chirstine Manta, Mark Shervey, Beau Woods, William A Wood,
     2 April 2020, Nature.com, https://www.nature.com/articles/s41746-020-0237-3#Fig2.
25   Sidewalk Labs, 19 April 2019, Sidewalks Labs GitHub Repository, https://github.com/sidewalklabs/dtpr/blob/master/
     dtpr_designguide/DTPR_Design_Guide.pdf.
26   Jonathan A. Obar, Anne Oeldorf-Hirsch, “The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of
     Service Policies of Social Networking Services”, 18 August 2018, https://papers.ssrn.com/sol3/papers.cfm?abstract_
     id=2757465.
27   Terms and Service Didn’t Read, https://tosdr.org/index.html.

                                                                                  Feeling Safe in the Home of the Future       15
28   Tesla, https://www.tesla.com/support/insurance.
29   LG, https://www.youtube.com/watch?v=AYVWqfJaR3o.
30   SONOS, https://blog.sonos.com/en/end-of-software-updates-for-legacy-products.
31   Ruchna Nigam, 18 March 2019, “New Mirai Variant Targets Enterprise Wireless Presentation & Display Systems”,
     Palo Alto Networks, https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-
     presentation-display-systems.
32   International Organization for Standardization, https://www.iso.org/isoiec-27001-information-security.html.
33   International Organization for Standardization, https://www.iso.org/standard/50038.html.
34   Jason Cipriani, 29 May 2019, “Amazon Echo stores your voice commands. Here’s how Alexa can delete them”,
     C|net, https://www.cnet.com/how-to/amazon-echo-stores-your-voice-commands-heres-how-alexa-can-delete-
     them.
35   European Telecommunications Standardization Institute, https://www.etsi.org/deliver/etsi_en/303600_303699/30
     3645/02.00.00_20/en_303645v020000a.pdf.
36   Department for Digital, Culture, Media & Sport, “Code of Practice for Consumer IoT Security”, October 2018,
     https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/773867/
     Code_of_Practice_for_Consumer_IoT_Security_October_2018.pdf.
37   Michael Fagan, Katerina N. Megas, Karen Scarfone, Mathew Smith, “Foundational Cybersecurity activities for
     IoT device manufacturers”, National Institute of Standards and Technology, 1 May 2020 https://nvlpubs.nist.gov/
     nistpubs/ir/2020/NIST.IR.8259.pdf.
38   Security and Privacy in the Lifecycle of IoT for Consumer Environments (SPLICE), https://splice-project.org.

                                                                           Feeling Safe in the Home of the Future   16
The World Economic Forum,
committed to improving
the state of the world, is the
International Organization for
Public-Private Cooperation.

The Forum engages the
foremost political, business
and other leaders of society
to shape global, regional
and industry agendas.

World Economic Forum
91–93 route de la Capite
CH-1223 Cologny/Geneva
Switzerland
Tel.: +41 (0) 22 869 1212
Fax: +41 (0) 22 786 2744
contact@weforum.org
www.weforum.org
You can also read